Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/14731
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sanjay | |
dc.contributor.author | Rajendran B. | |
dc.contributor.author | Shetty P. | |
dc.date.accessioned | 2021-05-05T10:15:42Z | - |
dc.date.available | 2021-05-05T10:15:42Z | - |
dc.date.issued | 2020 | |
dc.identifier.citation | Proceedings of the 5th International Conference on Inventive Computation Technologies, ICICT 2020 , Vol. , , p. 230 - 236 | en_US |
dc.identifier.uri | https://doi.org/10.1109/ICICT48043.2020.9112413 | |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/14731 | - |
dc.description.abstract | DNS is a critical infrastructure service of the Internet that translates hostnames to network IP addresses and vice versa. The criticality of DNS can be evidenced by the fact that all most all organizations and enterprises do not block DNS traffic, as it would eventually stop access to the Internet. As a result, attackers have been exploiting the DNS infrastructure and using it as a launchpad for carrying out various attacks e.g. DoS/DDoS, DNS reflection amplification, DNS tunneling, NXDOMAIN attack, and DNS hijacking, etc. During the historic implementation of DNS protocol, its security was not considered which lead to the exploitation of various vulnerabilities in the DNS infrastructure.This paper brings out the technicalities behind DNS amplification and DNS tunneling attacks and presents a number of countermeasures and mitigation techniques to protect against these attacks and the DNS Infrastructure. © 2020 IEEE. | en_US |
dc.title | DNS Amplification DNS Tunneling Attacks Simulation, Detection and Mitigation Approaches | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.